Vulnerability Name:

CVE-2009-4897 (CCN-60380)

Assigned:2009-06-16
Published:2009-06-16
Updated:2017-08-17
Summary:Buffer overflow in gs/psi/iscan.c in Ghostscript 8.64 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted PDF document containing a long name.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Ghostscript Bugzilla Bug 690523
gs pdf parsing buffer overflow

Source: CONFIRM
Type: Vendor Advisory
http://bugs.ghostscript.com/show_bug.cgi?id=690523

Source: MITRE
Type: CNA
CVE-2009-4897

Source: SECUNIA
Type: Vendor Advisory
40580

Source: GENTOO
Type: UNKNOWN
GLSA-201412-17

Source: DEBIAN
Type: DSA-2093
ghostscript -- several vulnerabilities

Source: CCN
Type: Ghostscript Web site
Ghostscript

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:134

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2010:135

Source: OSVDB
Type: UNKNOWN
66277

Source: CCN
Type: OSVDB ID: 66277
Ghostscript on Ubuntu gs/psi/iscan.c Malformed PDF/PS File Arbitrary Code Execution

Source: BID
Type: Patch
41593

Source: CCN
Type: BID-41593
Ghostscript 'iscan.c' PDF Handling Remote Buffer Overflow Vulnerability

Source: UBUNTU
Type: UNKNOWN
USN-961-1

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=613792

Source: XF
Type: UNKNOWN
ghostscript-iscan-bo(60380)

Source: XF
Type: UNKNOWN
ghostscript-iscan-bo(60380)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:artifex:afpl_ghostscript:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:6.01:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:6.50:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:7.00:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:7.03:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:7.04:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.00:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.11:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.12:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.13:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.14:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.50:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.51:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.52:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.53:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:afpl_ghostscript:8.54:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:ghostscript_fonts:8.11:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.15:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.50:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.51:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.54:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.56:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.57:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.60:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.61:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.62:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.63:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:* (Version <= 8.64)
  • OR cpe:/a:artifex:gpl_ghostscript:8.70:*:*:*:*:*:*:*
  • OR cpe:/a:artifex:gpl_ghostscript:8.71:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ghostscript:ghostscript:8.64:*:*:*:*:*:*:*
  • AND
  • cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.0:-:x86_64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:linux:2009.1:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:*:*:*:*
  • OR cpe:/o:mandriva:enterprise_server:5:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:x86_64:*:*:*
  • OR cpe:/o:mandriva:linux:2010:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20094897
    V
    CVE-2009-4897
    2022-05-20
    oval:org.mitre.oval:def:12750
    P
    USN-961-1 -- ghostscript vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:12743
    P
    DSA-2093-1 ghostscript -- several
    2014-06-23
    oval:org.debian:def:2093
    V
    several vulnerabilities
    2010-08-19
    BACK
    artifex afpl ghostscript 6.0
    artifex afpl ghostscript 6.01
    artifex afpl ghostscript 6.50
    artifex afpl ghostscript 7.00
    artifex afpl ghostscript 7.03
    artifex afpl ghostscript 7.04
    artifex afpl ghostscript 8.00
    artifex afpl ghostscript 8.11
    artifex afpl ghostscript 8.12
    artifex afpl ghostscript 8.13
    artifex afpl ghostscript 8.14
    artifex afpl ghostscript 8.50
    artifex afpl ghostscript 8.51
    artifex afpl ghostscript 8.52
    artifex afpl ghostscript 8.53
    artifex afpl ghostscript 8.54
    artifex ghostscript fonts 8.11
    artifex gpl ghostscript 8.01
    artifex gpl ghostscript 8.15
    artifex gpl ghostscript 8.50
    artifex gpl ghostscript 8.51
    artifex gpl ghostscript 8.54
    artifex gpl ghostscript 8.56
    artifex gpl ghostscript 8.57
    artifex gpl ghostscript 8.60
    artifex gpl ghostscript 8.61
    artifex gpl ghostscript 8.62
    artifex gpl ghostscript 8.63
    artifex gpl ghostscript *
    artifex gpl ghostscript 8.70
    artifex gpl ghostscript 8.71
    ghostscript ghostscript 8.64
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.0
    mandriva linux 2009.0
    mandriva linux 2009.0 -
    debian debian linux 5.0
    mandriva linux 2009.1
    mandriva linux 2009.1
    mandriva enterprise server 5
    mandriva enterprise server 5
    mandriva linux 2010
    mandriva linux 2010